
Cloud Encryption Explained with Game of Thrones
Encryption terms explained in a different way: with examples from Game of Thrones. Learn about the difference between end-to-end-encryption or encryption at rest; or how hashes work in GoT terms.

Social Bots – How They Work, How They Help, and How They Can Be Trouble
According to the social networks themselves, approximately 9-15% of accounts on Facebook and Twitter are fake. We explain what social bots are, how they work and how to spot them.

Fresh Start in 2018: Minimalism in Your Digital Life
The trends of minimalism and sustainability should be internalized by IT, and play a role in our behavior in the tech-world. Find out why and how you can get started.

Best of TV: The Funniest Hacking and Tech Scenes in American TV Shows
How realistic are TV shows when it comes to hacking and techy stuff? Let´s have a look at some typical scenes. We collected the funniest hacking and tech depictions on American TV shows.

Paranormal Cloud Activity – Discover the Dark Side of the Cloud in our Halloween Special
Here is a special treat to get you in the Halloween spirit: Take a frightening look at the threats of the cloud and learn how to protect your sensitive data from evil forces.

The 5 Best IT TV-Series – Of Hackers and Nerds
Are you looking for a new TV series for a rainy weekend? Here are the 5 best IT series that center on technology, the IT-world, and cybercrime.

The 5 Best Hacker Movies
In hacker movies technical details are sometimes put aside in favor of suspense and understandability. Still, a good hacker movie shows us the possibilities and dangers of the cyber world. Here are our 5 favorites.

Berlin International Film Festival and Zero-Day Exploits
At the Berlin International Film Festival 2016 Oscar-winning director Alex Gibney takes on the topic of Zero-Day exploits with a prominent example: The computer worm Stuxnet.